{"id":2521,"date":"2024-07-01T13:24:59","date_gmt":"2024-07-01T04:24:59","guid":{"rendered":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/?p=2521"},"modified":"2024-08-30T13:29:31","modified_gmt":"2024-08-30T04:29:31","slug":"%e3%80%90%e6%9c%80%e6%96%b0%e3%81%ae%e3%83%93%e3%83%ab%e3%83%89%e3%81%a7%e4%bf%ae%e6%ad%a3%e6%b8%88%e3%81%bf%e3%80%91patch-manager-plus%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7cve-2023-6105%e3%81%ab","status":"publish","type":"post","link":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/?p=2521","title":{"rendered":"\u3010\u6700\u65b0\u306e\u30d3\u30eb\u30c9\u3067\u4fee\u6b63\u6e08\u307f\u3011Patch Manager Plus\u306e\u8106\u5f31\u6027(CVE-2023-6105)\u306b\u3064\u3044\u3066"},"content":{"rendered":"<h4>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Patch Manager Plus\u306e\u8106\u5f31\u6027(CVE-2023-6105)\u306b\u3064\u3044\u3066<\/h4>\n<h5>\u3010\u5bfe\u8c61\u30d3\u30eb\u30c9\u3011<\/h5>\n<p>Patch Manager Plus 11.2.2320.1 \u4ee5\u524d\u306e\u30d3\u30eb\u30c9<br \/>\n\u30d3\u30eb\u30c9\u306e\u78ba\u8a8d\u65b9\u6cd5\u306f<a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/?p=607\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089<\/a>\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n<h5>\u3010\u554f\u984c\u3011<\/h5>\n<p>\u4e0a\u8a18\u5bfe\u8c61\u30d3\u30eb\u30c9\u306ePatch Manager Plus\u306b\u306f\u4e0d\u9069\u5207\u306a\u30d5\u30a9\u30eb\u30c0\u30fc\u6a29\u9650\u306e\u8106\u5f31\u6027 (CVE-2023-6105) \u304c\u5b58\u5728\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6105\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6105<\/a>(NVD)<\/li>\n<li><a href=\"https:\/\/jvndb.jvn.jp\/ja\/contents\/2023\/JVNDB-2023-017970.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/jvndb.jvn.jp\/ja\/contents\/2023\/JVNDB-2023-017970.html<\/a>(JVN)<\/li>\n<li><a href=\"https:\/\/www.manageengine.com\/security\/advisory\/CVE\/CVE-2023-6105.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.manageengine.com\/security\/advisory\/CVE\/CVE-2023-6105.html<\/a>(ManageEngine Security Advisory)<\/li>\n<\/ul>\n<h5>\u3010\u5f71\u97ff\u3011<\/h5>\n<p>\u3053\u306e\u8106\u5f31\u6027\u306b\u3088\u308a\u3001\u88fd\u54c1\u30b5\u30fc\u30d0\u30fc\u3078\u306e\u30ed\u30b0\u30a4\u30f3\u6e08\u307f\u30e6\u30fc\u30b6\u30fc\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30d5\u30a9\u30eb\u30c0\u30fc\u3084\u30d5\u30a1\u30a4\u30eb\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u53ef\u80fd\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n\uff08\u88fd\u54c1\u30b5\u30fc\u30d0\u30fc\u5185\u306e\u30d5\u30a9\u30eb\u30c0\u30fc\u3084\u30d5\u30a1\u30a4\u30eb\u3078\u30a2\u30af\u30bb\u30b9\u3059\u308b\u306b\u306f\u3001\u4ed6\u306e\u8106\u5f31\u6027\u3092\u60aa\u7528\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u306e\u8106\u5f31\u6027\u5358\u4f53\u3067\u306f\u3001\u88fd\u54c1\u30b5\u30fc\u30d0\u30fc\u5185\u306e\u30d5\u30a9\u30eb\u30c0\u30fc\u3084\u30d5\u30a1\u30a4\u30eb\u3078\u306e\u30a2\u30af\u30bb\u30b9\u306f\u53ef\u80fd\u306b\u306f\u306a\u308a\u307e\u305b\u3093\u3002\uff09<\/p>\n<h5>\u3010\u4fee\u6b63\u30d3\u30eb\u30c9\u3011<\/h5>\n<p>11.2.2322.1\u4ee5\u964d<\/p>\n<h5>\u3010\u5bfe\u51e6\u65b9\u6cd5\u3011<\/h5>\n<p>\u65e5\u672c\u56fd\u5185\u5411\u3051\u306b\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u3066\u3044\u308b\u30d3\u30eb\u30c9\u3078<a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/?cat=11\" target=\"_blank\" rel=\"noopener noreferrer\">\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9<\/a>\u3057\u307e\u3059\u3002<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Patch Manager Plus\u306e\u8106\u5f31\u6027(CVE-2023-6105)\u306b\u3064\u3044\u3066 \u3010\u5bfe\u8c61\u30d3\u30eb\u30c9\u3011 Patch Manager Plu\u2026 <a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/?p=2521\" class=\"more\">\uff3b\u7d9a\u304d\u3092\u8aad\u3080\uff3d<\/a><\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[76],"tags":[488,26],"class_list":["post-2521","post","type-post","status-publish","format-standard","hentry","category-security-ptm","tag-cve-2023-6105","tag-26"],"modified_by":"seiji","_links":{"self":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/posts\/2521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2521"}],"version-history":[{"count":2,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/posts\/2521\/revisions"}],"predecessor-version":[{"id":2523,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=\/wp\/v2\/posts\/2521\/revisions\/2523"}],"wp:attachment":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Patch_Manager_Plus\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}